The Mobile Terminal Security Access System Based on IPSec VPN

被引:0
|
作者
Zhao, Di [1 ]
He, Xin [2 ]
Li, Yunjun [1 ]
机构
[1] Yanbian Univ, Dept Comp Sci, Yanji 133002, Peoples R China
[2] Shanghai Informat Secur Engn Technol Res Ctr, Shanghai 201204, Peoples R China
关键词
IPSec VPN; mobile terminal; replacement algorithm of cryptographic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on IPSec VPN technology, we propose a scheme for realization of mobile terminal security access system. The scheme, which combines with SM2, SM3 and the IPSec, realizes the establishment of the IPSec VPN client data communication, and the client-server security communication functions by using the replacement of cryptographic algorithm and VPN interface technology. The security access system consists of two parts: mobile terminals and the application server. In this paper, we analyze IPSec, IKE negotiation process, and the replacement of cryptographic algorithm on both client and server side, and then propose a new scheme of security access system. The experiments demonstrate the new system provides safe, reliable, and accurate data communication.
引用
下载
收藏
页码:649 / 654
页数:6
相关论文
共 50 条
  • [31] A detailed implement and analysis of MPLS VPN based on IPSec
    Ren, R
    Feng, DG
    Ma, K
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2779 - 2783
  • [33] Efficient Algorithms for Dynamic Detection and Resolution of IPSec/VPN Security Policy Conflicts
    Niksefat, Salman
    Sabaei, Masoud
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 737 - 744
  • [34] IPsec Cryptography for Data Packets Security within VPN Tunneling Networks Communications
    Mahmmod, Khalid F.
    Azeez, Mohammed M.
    Ahmed, Mohamad A.
    2020 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICELTICS 2020), 2020, : 1 - 8
  • [35] Automated Security Configuration Checklist for a Cisco IPsec VPN Router using SCAP 1.2
    Peterside, Gabriel Biedima
    Zavarsky, Pavol
    Butakov, Sergey
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 355 - 360
  • [36] Building IPsec VPN in IPv6 based on Openswan
    Liu Lian
    Gao Wen-mei
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 784 - 787
  • [37] The design and application of data disaster recovery based on IPSec VPN
    Liu, Bo
    Wang, Wei
    Li, Wang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 281 - 283
  • [38] The Virtual Enterprise Network based on IPSec VPN Solutions and Management
    Rosu, Sebastian Marius
    Popescu, Marius Marian
    Dragoi, George
    Guica, Ioana Raluca
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (11) : 26 - 34
  • [39] IPSec-VPN Simulation Based on GNS3
    Yang, Fan
    Zhao, Lizhen
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 302 - 306
  • [40] Research on Network Security Based on IPSec
    Liu, Yanru
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 150 - 154